Try our new research platform with insights from 80,000+ expert users

Proofpoint Threat Response vs Splunk Security Essentials comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Proofpoint Threat Response
Ranking in Security Incident Response
4th
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
No ranking in other categories
Splunk Security Essentials
Ranking in Security Incident Response
11th
Average Rating
8.0
Reviews Sentiment
8.1
Number of Reviews
2
Ranking in other categories
Data Visualization (20th), IT Alerting and Incident Management (14th)
 

Mindshare comparison

As of May 2025, in the Security Incident Response category, the mindshare of Proofpoint Threat Response is 17.6%, up from 7.8% compared to the previous year. The mindshare of Splunk Security Essentials is 0.6%, down from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Incident Response
 

Featured Reviews

Giuseppe Sgroi - PeerSpot reviewer
Blocks potential spam emails efficiently and integrates well with our security framework
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails The platform's most valuable include the ability to check emails and block potential spam. The platform's technical support services and pricing need…
Srinivas Prudhivi Reddy - PeerSpot reviewer
Enables us to examine the parameters of the events found and take appropriate actions as necessary
Once we've configured our logs, for example, if we need to monitor processes and IP addresses, we ensure these logs are being ingested into our Splunk instance. The logs gathered from various endpoints are then consolidated into our Splunk platform. Once the data is collected, we can create searches and dashboards to analyze it. With these searches and dashboards, we gain insights into events and can make informed decisions based on them. We'll examine the parameters of these events and take appropriate actions as necessary.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so."
"The best part of Proofpoint Threat Response is the Auto-Pull feature. Being able to pull an email back from a user's mailbox is very useful, yet I have noticed that not a lot of organizations use this kind of feature."
"The platform's most valuable include the ability to check emails and block potential spam."
"Support is very responsive."
"If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules."
"The network monitoring feature is particularly valuable for gathering information about users, login times, and other statistics."
"We are focusing on security to ensure incidents are reported efficiently. In addition to that, for reporting purposes, we are utilizing our dashboards or creating new ones. We will be using free visualization tools for this purpose."
 

Cons

"If the reporting gets improved then it would be better, but the product is running amazing as it is."
"The on-premise version doesn't scale well for large companies."
"The interface within Threat Response could be made simpler."
"Has some quirks."
"The platform's technical support services and pricing need improvement."
"The price could be improved."
"The reporting feature needs to be more user-friendly."
 

Pricing and Cost Advice

"The way most big companies work with Proofpoint is that they try to tie everything into an enterprise license. I can't comment on the actual costs, however I do know that alternative solutions such as Abnormal Security can be much more expensive than Proofpoint Threat Response."
"It's quite affordable to have it with this much functionality and ease to administrate."
Information not available
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Healthcare Company
16%
Energy/Utilities Company
13%
Computer Software Company
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Proofpoint Threat Response?
I have a vague idea because I don't know what others are charging. But we felt that putting up with the pains and having to spend more time keeping it running than we expected is still better than ...
What needs improvement with Proofpoint Threat Response?
The platform's technical support services and pricing need improvement.
What is your primary use case for Proofpoint Threat Response?
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails.
What is your experience regarding pricing and costs for Splunk Security Essentials?
Pricing and licensing are managed by our vendor management team and are not under my purview.
What needs improvement with Splunk Security Essentials?
The reporting feature needs to be more user-friendly. It would help if it were easier to generate reports similar to other cybersecurity tools. Additionally, more automation in alert systems would ...
What is your primary use case for Splunk Security Essentials?
I use Splunk Security Essentials for monitoring as part of my organization. We use it for our security processes and to gather reports on performance, security, and bottlenecks. It's primarily util...
 

Overview

 

Sample Customers

University of Waterloo, Akorn, Fenwick and West LLP
Information Not Available
Find out what your peers are saying about Proofpoint Threat Response vs. Splunk Security Essentials and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.